Menu Close

Category: Blog (page 2 of 2)

WordPress Security for Bloggers

The main security risk of having a website is being hacked. Many believe that since their website is not in limelight, or since it does not hold any sensitive information it is not a target of the fraudsters.

Get your notions corrected. Hackers are after everything that your website has. They might hack a website to host and transfer warez and other forms of illegal files, so that they can use free bandwidth, which you pay for. Or they can …

Read the full article

All You Need to Know About “Google Hacking”


The concept of “Google Hacking” can be traced back to 2002, when Johnny Long started collecting extraordinary Google search queries that revealed vulnerable systems and/or sensitive information disclosures – branding them as googleDorks.The list of googleDorks grew into a dictionary of queries, which were eventually categorized into the Google Hacking Database (GHDB) in 2004.

In simple terms, it is a method of computer hacking that utilizes Google Search and other Google applications to locate security loopholes in the configurations …

Read the full article

WEP as a Weak Algorithm

Read the full article

An Introduction To Hacker’s OS: Kali Linux

We have had innumerable discussions on computer security till today. This article brings to you one of the biggest and the most important tools that every penetration tester or a hacker uses.

Today we are going to introduce you to Kali Linux, a Linux Distribution, which is more of a branch of Debian, but with several specialties. If you have heard of BackTrack, then Kali should be introduced to you more as an updated version of the former. “From the …

Read the full article

Five Ways To Stop Being Spied Online

Although there are conflicting research findings on the issue whether Internet has glorified our lives, it is more reasonable to believe that development and destruction go hand-in-hand. The advancements relished by technology with the advent of Internet knows no bounds. However, several issues of cyber crime, infringement, online spying, cyber warfare, cyber espionage and cyber terrorism, etc. have crippled the growth of Internet in today’s world. Recent study reveals, India is a slow achiever when it comes to …

Read the full article

Top 5 Biggest Online Security Breach in the History of Computers

Security BreachTechnology and science is making progress, and so is the other side of this double edged sword. Looking at the flip side of the coin once in a while would definitely tell us that we are developing, but facilitating the growth of the darker side of the new world too.

Security breach is one of the biggest examples of the negative effects of the progress in technology. And that is what I am going to talk about today. No security …

Read the full article

© 2022 Czar Securities. All rights reserved.

Theme by Anders Norén.